Immune system approaches to intrusion detection - A review

被引:128
|
作者
Kim J. [1 ]
Bentley P.J. [1 ]
Aickelin U. [2 ]
Greensmith J. [2 ]
Tedesco G. [3 ]
Twycross J. [2 ]
机构
[1] Department of Computer Science, University College London, London
[2] School of Computer Science, University of Nottingham, Nottingham
[3] Firestorm Development Team, Bradford
基金
英国工程与自然科学研究理事会;
关键词
Artificial immune systems; Intrusion detection systems; Literature review;
D O I
10.1007/s11047-006-9026-4
中图分类号
学科分类号
摘要
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. First, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Second, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research. © Springer Science+Business Media, Inc. 2007.
引用
收藏
页码:413 / 466
页数:53
相关论文
共 50 条
  • [31] Distributed Network Intrusion Detection System: An Artificial Immune System Approach
    Igbe, Obinna
    Darwish, Ihab
    Saadawi, Tarek
    [J]. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2016, : 101 - 106
  • [32] Network Intrusion Detection System Using Artificial Immune System (AIS)
    Suliman, Saiful Izwan
    Abd Shukor, Muhammad Safwan
    Kassim, Murizah
    Mohamad, Roslina
    Shahbudin, Shahrani
    [J]. PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 178 - 182
  • [33] Modeling approaches for intrusion detection and prevention system return on investment
    Leslie, Nandi O.
    Marvel, Lisa M.
    Edwards, Joshua
    Comroe, Kyra
    Shearer, Gregory
    Knachel, Lawrence
    [J]. CYBER SENSING 2017, 2017, 10185
  • [34] Intrusion detection techniques and approaches
    Verwoerd, T
    Hunt, R
    [J]. COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1356 - 1365
  • [35] A novel method of intrusion detection based on artificial immune system
    Zhang, Yu-Fang
    Sun, Gui-Hua
    Xiong, Zhong-Yang
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1602 - +
  • [36] A new intrusion detection method based on artificial immune system
    Wang, Baoyi
    Zhang, Shaomin
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 91 - 98
  • [37] Distributed intrusion detection system based on optimized immune algorithm
    Qiao, PL
    Su, J
    Sun, CW
    [J]. ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 2, 2005, : 377 - 383
  • [38] Network Intrusion Detection System Model Based On Artificial Immune
    Zhang Yanbin
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 359 - 369
  • [39] AINIDS - An immune-based network intrusion detection system
    Yan Qiao
    Yu Jianping
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [40] Research on Immune based Adaptive Intrusion Detection System Model
    Deng, Lei
    Gao, De-yuan
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 488 - 491